Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2012-06-12 |
Product | Lync | Last view | 2020-07-14 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2020-07-14 | CVE-2020-1025 | An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Business Server improperly handle OAuth token validation. An attacker who successfully exploited the vulnerability could bypass authentication and achieve improper access. To exploit this vulnerability, an attacker would need to modify the token. The update addresses the vulnerability by modifying how Microsoft SharePoint Server and Skype for Business Server validate tokens. |
6.5 | 2019-09-11 | CVE-2019-1209 | An information disclosure vulnerability exists in Lync 2013, aka 'Lync 2013 Information Disclosure Vulnerability'. |
6.5 | 2019-07-15 | CVE-2019-1084 | An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'. |
5.9 | 2018-11-13 | CVE-2018-8546 | A denial of service vulnerability exists in Skype for Business, aka "Microsoft Skype for Business Denial of Service Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Lync, Skype. |
8.8 | 2018-07-10 | CVE-2018-8311 | A remote code execution vulnerability exists when Skype for Business and Microsoft Lync clients fail to properly sanitize specially crafted content, aka "Remote Code Execution Vulnerability in Skype For Business and Lync." This affects Skype, Microsoft Lync. |
7.8 | 2018-07-10 | CVE-2018-8238 | A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages, aka "Skype for Business and Lync Security Feature Bypass Vulnerability." This affects Skype, Microsoft Lync. |
8.8 | 2017-10-13 | CVE-2017-11786 | Skype for Business in Microsoft Lync 2013 SP1 and Skype for Business 2016 allows an attacker to steal an authentication hash that can be reused elsewhere, due to how Skype for Business handles authentication requests, aka "Skype for Business Elevation of Privilege Vulnerability." |
7.5 | 2017-09-12 | CVE-2017-8696 | Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to execute code remotely via a specially crafted website or a specially crafted document or email attachment, aka "Microsoft Graphics Component Remote Code Execution." |
5.3 | 2017-09-12 | CVE-2017-8695 | Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability." |
3.3 | 2017-09-12 | CVE-2017-8676 | The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an authenticated attacker to retrieve information from a targeted system via a specially crafted application, aka "Windows GDI+ Information Disclosure Vulnerability." |
8.8 | 2017-06-14 | CVE-2017-8527 | Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Graphics Remote Code Execution Vulnerability". |
8.8 | 2017-06-14 | CVE-2017-0283 | Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office Word Viewer, Microsoft Lync 2013 SP1, Skype for Business 2016, Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows, and Microsoft Silverlight 5 when installed on Microsoft Windows allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8528. |
7.8 | 2017-03-16 | CVE-2017-0108 | The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014. |
4.3 | 2017-03-16 | CVE-2017-0073 | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062. |
5.5 | 2017-03-16 | CVE-2017-0060 | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062. |
9.8 | 2016-10-13 | CVE-2016-7182 | The Graphics component in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows attackers to execute arbitrary code via a crafted True Type font, aka "True Type Font Parsing Elevation of Privilege Vulnerability." |
7.8 | 2016-10-13 | CVE-2016-3396 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "GDI+ Remote Code Execution Vulnerability." |
5.5 | 2016-10-13 | CVE-2016-3263 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3262. |
5.5 | 2016-10-13 | CVE-2016-3262 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3263. |
5.5 | 2016-10-13 | CVE-2016-3209 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; Live Meeting 2007 Console; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4.5.2, and 4.6; and Silverlight 5 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "True Type Font Parsing Information Disclosure Vulnerability." |
7.8 | 2016-08-09 | CVE-2016-3304 | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303. |
7.8 | 2016-08-09 | CVE-2016-3303 | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3304. |
7.8 | 2016-08-09 | CVE-2016-3301 | The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability." |
8.8 | 2016-04-12 | CVE-2016-0145 | The font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold and 1511; Office 2007 SP3 and 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, and 3.5.1; Skype for Business 2016; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6108 | The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
29% (10) | CWE-200 | Information Exposure |
26% (9) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
20% (7) | CWE-20 | Improper Input Validation |
5% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
5% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
5% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
2% (1) | CWE-294 | Authentication Bypass by Capture-replay |
2% (1) | CWE-19 | Data Handling |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:14874 | Lync Insecure Library Loading Vulnerability (CVE-2012-1849) |
oval:org.mitre.oval:def:15530 | HTML Sanitization Vulnerability - MS12-050 |
oval:org.mitre.oval:def:14976 | Vulnerability in HTML Sanitization Component Could Allow Elevation of Privile... |
oval:org.mitre.oval:def:15952 | Vulnerability in Lync Could Allow Remote Code Execution - MS13-041 |
oval:org.mitre.oval:def:17341 | TrueType Font Parsing Vulnerability - CVE-2013-3129 (MS13-052, MS13-053, MS13... |
oval:org.mitre.oval:def:17323 | TrueType font parsing vulnerability in Microsoft Silverlight - CVE-2013-3129,... |
oval:org.mitre.oval:def:21019 | Microsoft Graphics Component Memory Corruption Vulnerability (CVE-2013-3906) ... |
oval:org.mitre.oval:def:28875 | TrueType font parsing vulnerability - CVE-2015-1671 (MS15-044) (Mac OS X) |
oval:org.mitre.oval:def:28207 | TrueType font parsing vulnerability - CVE-2015-1671 (MS15-044) |
ExploitDB Exploits
id | Description |
---|---|
30011 | Microsoft Tagged Image File Format (TIFF) Integer Overflow |
19777 | IE9, SharePoint, Lync toStaticHTML HTML Sanitizing Bypass |
OpenVAS Exploits
id | Description |
---|---|
2012-10-10 | Name : Microsoft Products HTML Sanitisation Component XSS Vulnerability (2741517) File : nvt/secpod_ms12-066.nasl |
2012-07-11 | Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502) File : nvt/secpod_ms12-050.nasl |
2012-06-13 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988) File : nvt/secpod_ms12-037.nasl |
2012-06-13 | Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956) File : nvt/secpod_ms12-039.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2013-A-0225 | Microsoft GDI Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0042593 |
2013-A-0135 | Microsoft GDI+ Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0039199 |
2013-B-0071 | Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight Severity: Category II - VMSKEY: V0039211 |
2013-B-0051 | Microsoft Lync Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0037938 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-04-14 | Microsoft Windows GDI WMF out of bounds read attempt RuleID : 41994 - Type : OS-WINDOWS - Revision : 2 |
2017-04-14 | Microsoft Windows GDI WMF out of bounds read attempt RuleID : 41993 - Type : OS-WINDOWS - Revision : 2 |
2017-04-12 | GDI+ malformed EMF comment heap access violation attempt RuleID : 41971 - Type : FILE-IMAGE - Revision : 1 |
2017-04-12 | GDI+ malformed EMF comment heap access violation attempt RuleID : 41970 - Type : FILE-IMAGE - Revision : 1 |
2017-04-12 | Microsoft Windows Uniscribe privilege escalation attempt RuleID : 41933 - Type : FILE-OTHER - Revision : 2 |
2017-04-12 | Microsoft Windows Uniscribe privilege escalation attempt RuleID : 41932 - Type : FILE-OTHER - Revision : 2 |
2016-11-11 | Microsoft Windows Win32k.sys sbit_Embolden use after free attempt RuleID : 40428 - Type : OS-WINDOWS - Revision : 2 |
2016-11-11 | Microsoft Windows Win32k.sys sbit_Embolden use after free attempt RuleID : 40427 - Type : OS-WINDOWS - Revision : 2 |
2016-11-11 | Microsoft Windows GDI+ EMF buffer overread attempt RuleID : 40426 - Type : OS-WINDOWS - Revision : 2 |
2016-11-11 | Microsoft Windows GDI+ EMF buffer overread attempt RuleID : 40425 - Type : OS-WINDOWS - Revision : 3 |
2016-11-08 | Microsoft Windows malformed TrueType file RCVT out of bounds read attempt RuleID : 40409 - Type : FILE-OTHER - Revision : 2 |
2016-11-08 | Microsoft Windows malformed TrueType file RCVT out of bounds read attempt RuleID : 40408 - Type : FILE-OTHER - Revision : 2 |
2016-09-13 | Microsoft Windows gdiplus EMF EmrText out of bounds write attempt RuleID : 39844 - Type : OS-WINDOWS - Revision : 6 |
2016-09-13 | Microsoft Windows gdiplus EMF EmrText out of bounds write attempt RuleID : 39843 - Type : OS-WINDOWS - Revision : 7 |
2016-09-08 | Microsoft Windows GDI emf file integer overflow attempt RuleID : 39825 - Type : OS-WINDOWS - Revision : 4 |
2016-09-08 | Microsoft Windows GDI emf file integer overflow attempt RuleID : 39824 - Type : OS-WINDOWS - Revision : 5 |
2016-05-12 | Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces... RuleID : 38494 - Type : FILE-OTHER - Revision : 2 |
2016-05-12 | Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces... RuleID : 38493 - Type : FILE-OTHER - Revision : 2 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38011 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38010 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38009 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38008 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38007 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38006 - Type : BROWSER-PLUGINS - Revision : 1 |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38005 - Type : BROWSER-PLUGINS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO |
2017-10-10 | Name: The Microsoft Skype for Business or Microsoft Lync installation on the remote... File: smb_nt_ms17_oct_skype.nasl - Type: ACT_GATHER_INFO |
2017-09-13 | Name: An application installed on the remote Windows host is affected by multiple r... File: smb_nt_ms17_sep_office_web.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038782.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macosx_ms17_sep_office.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038777.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038783.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038788.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038792.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038799.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Office Products are affected by multiple vulnerabilities. File: smb_nt_ms17_sep_office.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Office Products are affected by multiple vulnerabilities. File: smb_nt_ms17_sep_office_viewers.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Skype for Business or Microsoft Lync or Microsoft Live Meeting ... File: smb_nt_ms17_sep_skype.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_win2008.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_win2008.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms17_jun_office.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022715.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: An application installed on the remote Windows host is affected by a remote c... File: smb_nt_ms17_jun_skype.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: A web application framework running on the remote host is affected by multipl... File: smb_nt_ms17_jun_4023307.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022727.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022726.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022725.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022724.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022719.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_4022714.nasl - Type: ACT_GATHER_INFO |